I am a cybersecurity professional specializing in ethical hacking, digital defense, and vulnerability assessment.
My primary focus is on proactively identifying and mitigating risks before they can be exploited by malicious actors.
I am strongly committed to safeguarding digital assets and anticipating adversarial tactics to remain one step ahead.
In addition to my cybersecurity expertise, I have a solid background in software development.
I design and implement Python-based tools for automation, threat intelligence, and SIEM optimization.
By integrating security and software engineering, I deliver efficient, resilient, and intelligent defense solutions.
I've been pursuing this journey with passion since 2021.
- Offensive & Defensive Security
- Rust & Python Development
- OSCP Preparation | Threat Hunting | SIEM Automation
- Red Team & Blue Team Simulations
- CTF Builder & Participant
My goal is to master every domain of cybersecurity — from threat intelligence to digital forensics, protocol analysis to security automation. I believe true expertise comes from understanding the full spectrum: attack, defense, detection, and response. I build tools, study behaviors, and explore systems to uncover how security truly works — end to end.
Because every system hides a story — of trust, logic, and flaws.
Exploring these layers isn't just about breaking things;
it's about understanding how they fail and how to make them stronger.
I believe true security comes from curiosity, ethics, and persistence.
I am actively developing expertise across key cybersecurity domains, emphasizing hands-on experience and continuous learning.
- Penetration Testing (Web, Network, Wireless)
- Vulnerability Assessment & Exploit Development
- Malware Analysis & Reverse Engineering
- Incident Response & Digital Forensics
- Threat Hunting & OSINT Investigation
- Social Engineering (Attack Simulations & Defense Strategies)
- Secure Software Development (Rust, Python, Bash, C)
- Network Protocol Analysis (Wireshark, Scapy)
- Container & Cloud Security (Docker, Kubernetes, AWS, Azure, GCP)
- Secure Coding Practices & Code Auditing
- Automation & Tool Development for Pentesting
- Red Team Simulation & Adversarial Behavior Analysis
- Building & Hosting CTF Challenges
- Advanced Threat Modeling & Risk Assessment
- Zero Trust Architecture Design & Implementation
- Firmware & Hardware Security Analysis (UEFI, JTAG, SPI)
- Security Research & Exploit Development for Emerging Technologies (IoT, ICS/SCADA)
- Security Automation with CI/CD (GitHub Actions, GitLab CI, Jenkins)
- Offensive Security: Metasploit, Metasploitable 2, Burp Suite, Nmap, SQLMap, Hydra, Gobuster, and more.
- Defensive & Monitoring: Splunk, ELK Stack, Wireshark, Suricata, Zeek, Wazuh
- Forensics: Autopsy, Volatility, FTK Imager, Binwalk, Ghidra, IDA Free
- Programming & Scripting: Rust, Python, Bash, C, PowerShell
- Cloud & Infrastructure: Docker, Kubernetes, AWS, Azure, GCP
- Operating Systems: Kali Linux, Parrot OS, Arch Linux, Ubuntu, WSL, Windows Server
- OSINT (Open Source Intelligence): Maltego, theHarvester, SpiderFoot, Shodan, Recon-ng, FOCA, Google Dorks, OSINT Framework
Specialized hardware used strictly in controlled lab environments for ethical research.
- Flipper Zero
- HackRF One
- Proxmark3 RDV4
- WiFi Pineapple
- Raspberry Pi
- Designing and hosting CTF challenges (Jeopardy & Attack-Defense style)
- Real-world penetration testing scenarios (Web, Network, Wireless)
- Malware analysis, unpacking, and reverse engineering
- Secure coding and auditing in Rust, Python, and Bash
- Contributing to open-source cybersecurity tools and red team utilities
Planned certifications and academic milestones include:
- Offensive Security Certified Professional (OSCP) – Advanced penetration testing and exploit development
- Certified Ethical Hacker (CEH) – Ethical hacking methodologies and threat analysis
- GIAC Security Essentials (GSEC) – Foundational security concepts and enterprise defense
- CISSP – Certified Information Systems Security Professional
- CompTIA Security+ - Foundational cybersecurity knowledge with global recognition
- English
- German — A1 (Beginner)
A modular platform for red teams, analysts, and responders.
Provides system analysis, memory forensics, and controlled offensive operations.
Status: v1.0.0 — Actively maintained
License: GPL v3.0
- Conducted research in network security and developed new vulnerability scenarios.
- Developed new Rust modules for the open-source security tool “Obscuron.”
- Published technical research notes on malware reverse engineering and network protocol analysis.
- Performed vulnerability assessments and created Proof of Concept (PoC) exploits in controlled lab environments.
- Designed and hosted CTF challenges adopted by local cybersecurity communities.
Professional blog entries focused on hardware security, wireless protocol analysis, and offensive security tooling.
- Website: https://x99874.github.io/X99874/
- Email: Coming soon
- Portfolio: https://x99874.github.io/X99874/
- CTF Writeups & Labs: https://github.com/X99874/X99874/tree/main/portfolio
- Research Notes: https://github.com/X99874/X99874/tree/main/reflections
- GitHub: https://github.com/X99874
- PGP Public Key:
Coming soon — for secure communication and verification
- All research and experiments are conducted in controlled environments.
- I strictly follow responsible disclosure principles.
- I do not engage in or endorse illegal activity of any kind.
- The goal is always learning, defense, and responsible innovation.
⭐ If you find my projects useful, don't forget to give them a star!
👥 Also, consider following me to stay updated with my latest cybersecurity tools and writeups.
🤝 For collaboration or inquiries, please reach out via my portfolio or GitHub.
Thanks for visiting my profile! 🚀
- Developing Rust-based security tools for automation
- Studying advanced malware analysis and reverse engineering
- Preparing for OSCP certification
- Building new CTF challenges for Red Team simulations
- I am experimenting with threat-hunting automation and SIEM data analysis.
“Cybersecurity is the discipline that transforms uncertainty into trust, and vigilance into resilience.”
— X99874
© 2025 X99874 — All Rights Reserved
All research and projects are conducted under ethical cybersecurity practices and responsible disclosure principles.
Disclaimer: All tools and research are developed for educational and ethical purposes only.